News

Enter ITIL® 4, the latest evolution of the IT Infrastructure Library, and a powerful response to these changing demands.
All detection examples are mapped to techniques from the MITRE ATT&CK framework: ...
In this article I’ll guide you step-by-step through configuring Keycloak to connect to an LDAP server using a secure LDAPS (SSL/TLS) connection, with support for certificates signed by either internal ...
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But ...
NeDi: Troubleshooting NeDi Discovery and Configuration File Backup A customer with a NetEye installation to which I had added the NeDi module asked me if I could integrate the saved configuration ...